Adversary Emulation Framework (AEF) is a fully functional red team toolkit designed to simulate real-world cyber threat behavior using the MITRE ATT&CK framework. This tool enables security professionals to evaluate and improve the resilience of their infrastructure by emulating threat actor tactics, techniques, and procedures (TTPs) in a controlled environment.
-
🎯 Realistic Attack Simulation
Execute real emulation playbooks based on APT groups like APT29, FIN7, and more. -
🧠 Modular Architecture
Easily extend and plug in new TTPs, playbooks, or custom logic through Python modules. -
📖 MITRE ATT&CK Mapped
All playbooks and modules are mapped to MITRE ATT&CK tactics and techniques. -
⚙️ Real and Safe Modes
Run modules in--mode safefor simulation or--mode realto perform real (but contained) actions. -
📝 Detailed Logging
Track executions, results, and any failures via structured logging for audit and analysis.
adversary-emulation-framework/
│
├── core/ # Core engine: executor, scheduler, logger
├── modules/ # Attack modules (e.g., recon, privilege escalation, etc.)
├── playbooks/ # YAML playbooks for threat actor simulations
├── config/ # Configuration files (e.g., config.yaml)
├── docs/ # Documentation and usage guidelines
├── main.py # Entry point to the framework
├── requirements.txt # Python dependencies
└── install.sh # Setup and environment installation script
git clone https://github.com/Aviral2642/adversary-emulation-framework.git
cd adversary-emulation-framework
chmod +x install.sh
./install.shRun a specific threat emulation playbook in real or safe mode:
python main.py --playbook playbooks/apt29.yml --mode realOptions:
--playbook: Path to the YAML playbook (e.g., APT29, FIN7)--mode:realto execute real actions, orsafeto simulate
| Playbook | Description |
|---|---|
apt29.yml |
Emulates the APT29 threat group using MITRE-mapped techniques |
fin7.yml |
Simulates FIN7 behavior with persistence, lateral movement, and more |
custom-threat.yml |
Create your own attack chain with custom modules |
Check out the docs/ folder for:
README.md: Overview and setupusage.md: CLI options and use casesATTACK-matrix.md: List of implemented MITRE ATT&CK techniques
We welcome PRs and suggestions! Please open an issue or a discussion before submitting major changes.
This tool is intended for educational and authorized red team use only. Do not use this framework against systems you do not own or have explicit permission to test.
MIT License © 2025 Aviral Srivastava